480.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 62 行

TXT
62
字号
Rule:--Sid:480--Summary:This event is generated when a benevolent ping used by SpeedEra.net tofind the closest cache to a host is detected.--Impact:Unknown.--Detailed Information:After visiting certain speedera.net sites, several pings will bereceived by the host. These pings are sent so that speedera can find theclosest cache to the host. This rule is intended to distinguish theusually benevolent speedera pings from normal, possibly malevolent pings.--Affected Systems:	All systems --Attack Scenarios:This is not really an attack.  However an attacker could disguise theirpings as speedera pings, but this is unlikely.--Ease of Attack:Simple.--False Positives:None Known--False Negatives:None Known--Corrective Action:None required.--Contributors:Original rule writer unknownSnort documentation contributed by Drew Hintz ( http://guh.nu )Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Linux Security:http://www.linuxsecurity.com/articles/firewalls_article-2064.html--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?